Application management

Keyboard Shortcuts

One of the best ways to protect against malicious software is to prevent users from running unwanted applications with a technology called application control. Application control restricts the software that runs on a system to programs that meet the organization’s security policy. Learn about implementing application control via whitelists and blacklists, patching applications, and host software baselining.

- [Instructor] One of the best ways to protect against…malicious software is to prevent users from running…unwanted applications with a technology called…application control.…Application control restricts the software that runs…on a system to programs that meet the organizations…security policy.…There are two main approaches to application control.…Whitelisting…and blacklisting.…In the whitelisting approach, administrators create…a list of all of the applications that users…may run on their systems.…This works well in a very tightly controlled environment…but can be difficult to administer if you have many…different applications and roles.…

Author

Released

12/16/2016

The Certified Information System Security Professional (CISSP) certification is the industry's gold standard in information security. CISSP certification is an important component of any security professional's resume, and is a requirement for many top jobs. In this course, prepare for the fourth domain of the exam: Communication and Network Security.

Learn about communication and networking best practices, including TCP/IP networking, network security devices, and secure network design and management. Instructor and cybersecurity expert Mike Chapple also includes coverage of converged protocols, network encryption, and wireless networking. You can find Mike's companion study books for this series at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.